The Malware adds the following keys to the Windows registry to ensure
persistence upon reboot:

Once the computer is compromised, the malware copies its own executable
file to Userprofile folder and runs following commands:

A user's data can be very valuable for an attacker, thereby more data
translates to more profit. The main goal of this malware is to get as much
user data as possible. The malware also performs key logging and steals
clipboard data from target and saves in following registry key: